GIVE YOUR BUSINESS
ABSOLUTELY NEW COMPUTING EXPERIENCE
Benefits of the NComputing U170
Cost effective
Save up to 40% of your hardware cost versus buying a Dual Core/Core
2 Duo or equivalent PC NComputing U170 allows any office or home
users to add terminals to existing Host PC easily and affordably.
Electricity Saving
NComputing U170 consumes 2W Power only (No Power Adaptor
needed) saving appx Rs. 3,000p.a. on electricity bills.
No maintenance required
You only have to maintain and upgrade the Host PC, Ncomputing U170
requires no hardware maintenance.
Five Minutes Installation
NComputing U170 terminal can be installed even by Novice in five
Minutes. No Technical Expertise required.
Small sleek design--APC that fits into the Palm
Space saving design allows more room for your office or desk area.
Vesa Mounting Option available.
Automatic Login
NComputing U170 offers Automatic Login feature which will help the
product to be used in Kiosks, Digital Signage Applications.
Perfect for Multi Media Applications
NComputing U170 supports high resolution Graphics with 32 bit color
support making it a suitable product for High end Multimedia Content.
Even Full Screen Video can be played efficiently on U170 terminals.
Expandability
9 units of NComputing U170 can be connected to single Host PC with
Windows XP Professional (Active USB Hub will be required).

If uptime is your business, let MARTECH SYSREMS &
SERVICES help you choose one of our world-class
service offerings for your APC product.Our, scalable
redundant solutions are easily managed and
supported by the top experts in the industry.

Delhi Office : 123, Sangli Mass, M.J.R.F. Marg, Mandi House, New Delhi-110001
Mob : 9310097456, eMail: connexxionmedia@gmail.com
The Editor is no way responsible for the views expressed by the authors and for
the verification of the authenticity of various articles appearing in this Magazine.
All traditional/ Brand/ Logos etc. belongs to their respective owners and hence
Connexxion Media is not Liable for any of the mishaps.
All disputes are subject the exclusive jurisdiction of competent courts and forms in Ghaziabad (U.P.)
Edited, Printed & Published By Subhash Akhil on behalf of Connexxion Media Pvt. Ltd.
at Sec. 2C/252, Chaudhary Complex, Vasundhara, Ghaziabad
Printed at : Universal Offsets, 135 Patparganj Industrial Estate, New Delhi- 110092
All Rights reserved

he IT disaster recovery planning
from the U.S. Federal Aviation
Administration's (FAA) recent
computer problems, which caused flight
delays and cancellations at airports across
the country, has led to a lesson for all IT
corporates.
The root cause of the FAA outage, which
lasted nearly five hours, was reportedly the
failure of a circuit board inside a router at
the FAA Telecommunications Infrastructure
(FTI) facility in Salt Lake City. Details on
why the backup router did not engage are
still unavailable. The failure brought down a
flight management system, forcing air
traffic controllers to rely on faxes and
emails to communicate flight plans.
As per the reports of experts, the FAA
attributed the outage to a software
configuration problem, suggesting the
single-component failure was compounded
by a configuration management failure. But
the details of the incident hardly matter
compared with the IT disaster recovery
planning lessons it holds. Equipment failure
is the foremost reason for disaster recovery
declarations. Most IT disasters have
nothing to do with the type of disaster that
wipes out a facility, which is what many
organizations consider when doing their IT
disaster recovery planning. Equipment
malfunctions compounded by change or
configuration management failures are a
double whammy. This certainly seems to be
the case in the FAA incident. Testing for
capacity is critical in IT disaster recovery
planning. But foolproof testing is
sometimes impossible. Even if the
organization follows testing best practice,
the amount of change in the data center can
put it at risk.
The ever big disaster in FAA has left many
organizations with a question mark
regarding the failover question versus the
manual recovery question.

Bored of the mundane video calling?
Get ready for an all new exciting
video calling experience with Microsoft
Hardware's latest web-cam, the LifeCam
VX-2000. The leader in computer and
gaming peripherals category- Microsoft
Hardware's LifeCam VX-2000 combines
an elegant design with a high quality
built-in microphone, vivid VGA video and
lets you record and send videos when
friends are not around for a live call.
This new webcam is easy to set up, using
their broadband connection; consumers
can easily connect with friends and
family, just in seconds.

LIFECAM VX-2000

T

echnology and design are two factors that have always
been paramount to Microsoft Hardware. Microsoft is
committed to delivering quality products at great price
points. Video calling has become the most viable technology
for consumers and businessesz alike, especially when people
around the world are looking at minimizing their travel cost.
Responding to the growth of video calling, Microsoft's VX2000 aims to bring the fun of video calling to more
consumers; letting people share life's moments across
boundaries. Featuring VGA video and 1.3MP still photography,
the VX-2000 provides crystal-clear images. It auto-adjusts
to low-light conditions and creates bright pictures in a variety
of scenarios. The LifeCam VX-2000 will be available from June
2010 for an estimated retail price of Rs. 1250. The product will
be available at all leading retail stores across the country. The
LifeCam VX-2000 is backed by a worldwide three-year limited
hardware warranty from Microsoft. More information a can be
found at
http://www.microsoft.com/hardware or you can log onto
www.microsoftstore.co.in to buy the product online.

Microsoft Hardware's LifeCam VX 2000
comes from the same range of award winning
webcams as the LifeCam Cinema which has
been declared as the best computer peripheral
of the year at NDTV Tech Life Awards 2010.
MAY - JUNE

MGE Galaxy3-Phase power protection designed to
meet the unique requirements of small to
large facility and equipment room applications

Need battery back up power for anything from a single PC to an entire data center Alsun Systems can offer one stop solution.
UPS Available for PC & Workstation, Appliance and Lighting Network & Server, Data Center & Facility & for Industrial purposes.

Smart-UPS速 RT (70VA-1400VA)

Symmetra速 PX (10kVA-125kVA)

AIS 3000 (2500VA-27500VA)

Performance power protection with scalable
runtime for space-constrained server rooms,
and voice and data networks

he era of technology certainly began with bigger things but slowly
and gradually formed into nano technology. Hard disk is an
excellent example to consider here, which took several people and
a trolley to board in an airplane because of its huge size and weight.
Similarly with CPU which has also molded its size and shape with the
generation. Well, these are the examples of things which have changed
their respective sizes with the time and with improvement in technology.
And to continue with the flow, the size, shape and weight of 'monitors'
are considered as an even bigger revolution in the computer world.

24

MAY - JUNE

VDT

IBM PC-DOS Computer

CRT Monitor

LCD Monitor

Plasma Monitor

Translucent Screen Monitor

A computer monitor got its existence in early 1980s when
the most monitors were terminals. They were boxy video
display terminals (VDTs) combined with an attached
keyboard. Terminals were attached to computers by a serial
interface. In those days, the VDT was commonly referred to
as a CRT (Cathode Ray Tube). Monitors journey had several
stations on the row. Initially it was VDTs, then VDM-I,
APPLE-II, Commodores Vic 20, 64 and 128. There were
several minds behind the introduction of each of them. Then
IBM came out with PC-DOS computers, which were dubbed
"three-piece computers''. And in that era, terms like "3
piecers" and "4 piecers" were popular marketing and sales
terms because the computers included three main
components, viz., the monitor, the keyboard and the CPU.
When the IBM PC-DOS computers arrived with separate
monitor and keyboard - the monitor connected directly to
the computer, just like the earliest personal computers
through a display device connection. These new monitors
used video cards that were either IBM monochrome (MDA),
IBM color graphics cards9 CGA), or Hercules (the first third
party ad on cards).
Now when monitor got its existence, it has also got
variations in its size, shape and weight. Lets start with
Cathode Ray Tube Monitors (CRT Monitors). The Cathode
Ray Tube is a vacuum tube which contains an electron gun (a
source of electrons) and a fluorescent screen, with internal
or external means to accelerate and deflect the electron
beam. It is used to create images in the form of light emitted
from the fluorescent screen. In television sets and computer
monitors, the entire front area of the tube is scanned
repetitively and systematically in a fixed pattern called a
raster. CRT monitors have high dynamic range, excellent
color, wide gamut, low black level and are usually much
cheaper than LCD and Plasma monitors. A Liquid Crystal
Display Monitor (LCD Monitor) has a thin, flat electronic
visual display that uses the light modulating properties of
liquid crystals (LCs). LCs do not emit light directly. Each pixel
of an LCD consists of a layer of molecules associated
between two transparent electrodes, and two polarizing
filters. With no actual liquid crystal between the polarizing
filters, light passing through the first filter would be blocked
by the second (crossed) polarizer. In most of the cases the
liquid crystal has double refraction. They are usually more
compact, lightweight, portable, and are available in a wider
range of screen sizes than CRT and other flat panel displays.
Plasma Monitor has also fixed its number in the counting of
monitors. In Plasma monitor, many tiny cells between just
two panels of glass hold a mixture of noble gases. The gas in
the cells is electrically turned into a plasma which emits
ultraviolet light which then excites phosphors to emit visible
light. Plasma displays should not be confused with LCDs as
these are based onto very different technology.

Dual Screen Monitor

Gaming Monitor

Gaming Wide Screen Monitor

3D Monitor

333D Monitor

Light Beam Technology

Moreover, experts of technology are working on the
successful installation of translucent screen monitors,
whilst, they have attained triumph in making dual screen
monitors, gaming monitors, 3D monitors, 333D monitors
(for which glasses are not required to watch) and light beam
technology popular. The introduction of light beam
technology for computers has vanished the chaos of size,
space and the mess of wires.

INSTRUCTION
STEP 1
Disconnect the computer from any electrical sources
and remove the side access panel. This may require
the removal of two thumbscrews from the rear face
of the computer chassis.
STEP 2
Locate the computer's power supply. This will be
against the rear face of the computer chassis near
either the top or the bottom.
STEP 3
Locate the electrical information label located on the
side of the power supply facing you. There will be
one or more listings under the heading "DC Output."
STEP 4
Multiply each DC output, listed as either 12V or 5V,
by its associated amperage rating.
STEP 5
Add the products of these multiplications together.
This is the theoretical maximum wattage of your PC.
It is important to keep in mind that no power supply
will actually meet its theoretical maximum. Rather,
they average 80 percent of the theoretical
maximum. The other 20 percent is usually lost as
heat during the electrical conversion from AC to DC.

Evaluate the
Wattage of PC
Do you know how much power your PC needsâ&#x20AC;ŚNo! So let's
do the math to get the PC all the power it needs.
The computer's overall wattage is determined by the power
supply unit installed within the system. As computers have
grown to encompass more power-hungry applications such
as ATI crossfire, NVIDIA SLI and
multi-CPU installations, it is
becoming important that
computer users understand
the wattage capabilities
of their computer so as
not to install
hardware that
requires more
power than the PC
can
provide.

ven if you don't have a job title that has the word green or sustainable in
it, there are countless ways to bring sustainability into your job. This is one
reason why I wrote the book, "The Sustainable MBA: The Manager's
Guide to Green Business" -- to give individual employees the tools to bring
sustainability into their workplace and to change business from the inside out.
We often don't realize the positive impact that we can have through the
decisions we make every day as employees and as consumers -- decisions that
effect both the companies we work for and the planet.
The good news: The possibilities are endless! Many of the first steps will be
straightforward. Others will require a little innovative thinking. To get you
started, here are eight ways you can begin getting involved in sustainability
and doing your part at work.

1. Get involved in office greening program
Participate in activities that are already
happening in your office such as recycling,
alternative commuting or employee engagement
programs. If these don't exist, start one.
2. Look at your company's position on
sustainability
Does your company have a sustainability
strategy? Does it produce a sustainability report?
If it does, take a look at it and see how this relates
to your work. If it doesn't have a strategy, again,
why not work to create one?
3. Take a look at your own job
Explore ways to incorporate sustainability
into what is already in your job description and
the goals of your team. Are there places you could
cut waste? Engage your suppliers? Change the
way something is designed? You know your job
best so you are ideally placed to see how and
where changes can be made.
4. Create a coalition
Speak to people in the company to connect
with others who are interested or are already
working in sustainability. Talk to people outside
the company to learn about how they are working
on sustainability within their own companies.
5. Support others in their activities
Be supportive of the work that your
employees or your colleagues are doing in this
area. Give members of your team time to explore
sustainability in the workplace or in the
community. Volunteer your own time and
expertise on sustainability initiatives happening
in and outside the company.
6. Share your experiences
Write articles, speak at events and share your
experiences in working on sustainability issues in
the workplace, the challenges you have faced and
how/if you overcame them. Speak up about the
areas you think need more work.
7. Be positive, but constructively critical
Rather than saying something won't work,
look at contributing to the discussion and working
through ideas to find a solution. Remember,
sustainability solutions need to make business
sense so make sure you focus on the business
case.
8. Stay informed
Look at professional or other organizations to
which you already belong to see what they are
doing in this area. Pretty much every profession
and industry is now getting involved in the
sustainability discussion and will have tools and
information relevant to the work you do. As
companies get more engaged in the sustainability
arena there are more and more opportunities to
work from the inside out. Increasingly
sustainability will become part of everyone's job
so it is important to be up to date and aware on
the issues.

LS Industries the ultimate Parent Company
of eSys India (Distribution), EZY Logistics,
(Logistics) & EZY Computing Solutions
(Manufacturing) listed on the Bombay Stock
exchange. LSI Corporation (NYSE:LSI) is a
leading innovator of silicon, custom and
standard product ICs, adapters, systems and
software technologies. Their products and
technologies are trusted by the world's best
known brands to power leading solutions in
the storage and networking markets. LSI
India is LSI's second largest R&D facility
outside the USA. In India, LSI Corporation
operates as three legal entities; LSI
Technologies India Pvt. Ltd. (Bangalore), LSI
Research (India) Pvt. Ltd (Bangalore), and
LSI Research & Development Pune Pvt.
Limited (Pune).
eSys Information Technologies Pvt. Ltd., the
world-leading information technology
company, and business process outsourcing
organization that envisioned and pioneered
the adoption of the flexible global business
practices that today enable companies to

“

operate more efficiently and produce more
value. Efficiency, reach and adaptability are
the core values that define eSys business
model for IT distribution. Since its
incorporation in Singapore in the year 2000,
eSys has set a scorching pace to become a
major IT component distribution network in
Asia and Europe with 32 in-country
subsidiaries and more than 100 points of
presence. eSys has service centers across
India at 48 locations. With the presence in 32
countries and across 100 plus outposts the
entire enterprise is running on one simple
p h ra s e : “ C o n s t a n t i n n ova t i o n t h a t
maximizes efficiencies to deliver enhanced
value to our customers”.
eSys PC has already been launched in India,
Middle East, Korea, UK and USA. As the
demand increases manufacturing also
increases. Now eSys extended the
distribution efficiencies and relationships to
materialize the concept of low cost
multimedia PC's. eSys PC has already been
launched in India, Middle East, Korea and UK.

Intel, Xerox, SAP, Foxconn, Fujifilm, Microsoft, Hynix Semiconductor, MSI, Numeric, ADC Krone, Universal Tech, Watch Guard
Every IT individual is well acquainted with eSys's IT aura. eSys
stands amongst top IT distribution companies and is present
amongst top 4 local PC brands. Its full service broad line
distribution, contract assembly, logistics and demand generation
makes it more popular. And with all such pros eSys has never let
its goodwill go down as its products are always distinctive,
efficient and cost effective distribution models. eSys has one of
the largest PC & CE integrated manufacturing facility in India and
has tie-ups with multiple MNC Vendors, viz., Intel, Xerox, SAP,
Foxconn, Fujifilm, Microsoft, Hynix Semiconductor, MSI,
Numeric, ADC Krone, Universal Tech, Watch Guard. It does
contract manufacturing for reputed brands.

Since 2008, Cafegadgets.in is powering e-commerce for the world's leading digital lifestyle company, Apple in
India by managing end to end online retailing, order management, marketing, creative, design, call centre,
logistics etc. Cafegadgets.in powers the channel redemption & loyalty program for Sun Microsystems in India
and manages the online marketing campaigns and customer acquisition programs for Sun in B2B segment like
Sun Start-up Essential Program. It has managed the reward program for Xerox channel partners & associates
and also managing Samsung Brand store on 80+ websites in India providing infrastructural support in terms of
designing, content management, order management, call centre, logistics, after sales support. Cafegadgets.in
drives the online sales initiative on behalf of Virgin Mobiles & also manages the end to end online marketing in
India. It is leading E-business partner for Virgin Mobiles and managed the entire emailing activities for their
customer retention and loyalty program. It used to get exclusive deals from multiple brands for HDFC bank
customers and managed end to end activities starting from designing the creative, banners till product
shipment to end customer. LG has appointed Cafegadgets.in to work on order management, leads generations,
invoicing, and daily/monthly reports.

Awards and Recognition
Industry Awards: Over the years EZY has
received more than 100 Industry awards
validating its position as exceptional
performer in the industry.
Government Recognition of EZY'
contribution to Singapore Economy.
National Youth Award for Entrepreneurship
2005 (Highest Civilian Youth Award in
Singapore).
IHQ (International Headquarter) Status for
EZY by Singapore Govt Finance and Treasury
Centre Status.
Anchor Company in i-Partners initiative of
Singapore Govt.
Enterprise of the Year 2005, Singapore
(Singapore Business Awards).
Ernst & Young Entrepreneur of the year
2005, Singapore.
Ernst & Young Emerging Entrepreneur of the
year 2005, Singapore. Among Top 10
Singapore companies in terms of overseas
revenue.
Top spot in Enterprise 50 awards 2005,

OPEN MULTIPLE GOOGLE ACCOUNTS IN CHROME
Work on two gmail accounts simultaneously in Google Chrome.
Google Chrome's incognito mode is less sophisticated than IE8's InPrivate browsing, but it has a
feature that will be useful for those who have more than one Google account. When you open a
window in incognito mode (Ctrl+Shift+N), your cookies from the standard session are no longer
available and you can easily log in to a new Google account.
Chrome's help center has more details about this feature. Webpages that you open and files
downloaded while you are incognito won't be logged in your browsing and download histories; all
new cookies are deleted after you close the incognito window. You can browse normally and in
incognito mode at the same time by using separate windows. Incognito mode is a window-level mode
- all pages viewed within this window are not persisted to the user's history, and incognito pages use
a temporary cookie store that is blank at the start of the incognito session. When you close the
incognito window, all the cookies are deleted so you need to log in again the next time you browse in
incognito mode. This trick can be used for any other services that allow multiple accounts, but you can
only use two accounts at the same time: one in a standard window and the other one in incognito
mode.

OVERALL RATING
BlazeDVD 5 is a very good DVD player software product,
offering useful features and a friendly navigation system. It
offers viewers a fairly good video picture and excellent
audio quality, simulating the sound of the theater. It comes
with everything you need to enjoy the pleasure of relaxing
to a good flick. With improved video resolution, BlazeDVD
would be a bit more competitive package for DVD player
software.
ITS FEATURES INCLUDE
New Fashion Skins; Record DVD Video/Audio; Smart
Stretch (Pro version only); Video Desktop; CD Audio
Playback; Preset Value for Color Adjustment; Playback
Pictures as Slideshow; Special Audio Effect & Equalizer
Preset Value; Visualization; Smart Media Detector and
more.
FEATURE SET
BlazeDVD includes a variety of features in its software
package, including the ability to set parental controls,
bookmark your favorite scenes, and play many of the
common VOB files, like Windows Media Video and DivX,
right from the hard drive easily. It ofcourse offers NTSC
region support as well PAL which is what is most commonly
used for DVDs.
EASE OF USE
BlazeDVD is setup as a two window system. One window is
the screen for watching movies and the other is for the DVD
manager tool for playing, fast-forwarding, etc. Now it is nice
to be able to put the manager tool anywhere you want but it
is slightly annoying when you need it in the middle of a
movie for something simple like pausing. Thanks to
Windows, we have alt+tab to save the day.
EASE OF INSTALLATION
We experienced no problems or complications during setup
and installation of BlazeDVD. There was nothing different
from any other program needed to install it.
VIDEO QUALITY
The video quality of BlazeDVD is good, but the resolution
lacks the sharpness that some of the other top ten products
have. If you have one of those wall sized screen
monstrosities then this may not be the product for you. In
part this may be because of the lack of HD support. Aside
from WMV-HD BlazeDVD 5 has little in the way of HiResolution formats and support.
AUDIO QUALITY
BlazeDVD has excellent audio quality, offering multichannel support, LPCM (Linear Phase Code Modulation),
and the ability to play Microsoft DirectSound. With all that
you can enjoy everything from a classic Dolby Digital
surround sound system to SRS quality stereo or
headphones. The only issue is that the standard version is
limited to only 5.1 surround sound. In order to compliment
a larger sound system, you'll have to upgrade to BlazeDVD
5 Pro.
HELP/SUPPORT

In simple terms, a virus can aptly be called a virtual
disease which affects a computer system and makes it
sick, forcing to act in a manner undesired by the user.
No good deed goes unpunished, and with the joys and
leisure that were brought by the computer, along came
the viruses to ruin all the fun. There are billions of
viruses out there, big and small. But there were some
that stood out and ruined things for us in a
spectacular fashion. Below is a list of 10 of the
deadliest virus which create havoc in
the virtual as well as the real world.

50

MAY - JUNE

Melissa

T

he creator of this virus received a 20 month jail sentence and a $5000 fine. Generated over a decade ago, this clever piece of
virtual disease operated through Microsoft Outlook. This is how it worked: you receive an email titled “Here is the Document you asked
for” from an unknown sender, you got infected as soon as you opened the email, and the virus would replicate and delivers itself to the
top 50 people on your list without you getting a hint of it. Some major US government departments were hit and the damage is thought to be
around $1 billion at least. A 20 month jail sentence well deserved.

MyDoom

M

yDoom was instigated somewhere in mid 2004 and it actually prompted US senator to propose the creation of a “National Virus
Response Centre”. The virus attacked in two phases; the first phase infected different Operating Systems, creating inroads and
backdoors and making them vulnerable to external users. Once this problem was sorted out, the MyDoom struck again after few
months, this time targeting the Search Engines like Google, slowing them down considerably, and crashing a few.

Nimda

S

pell it backwards and you will understand its prime targets: yes, the 'Admin' and servers. It was basically a worm and has the record of
being the fastest ever virus to spread; it took only 22 minutes to break into the list of top ten most deadly viruses of all times. It
basically targeted internet servers and websites, creating a mass crater through which thousands of computers were affected at the
same time. Once infected, the systems became exposed to open attacks by the outsiders.

Code Red

D

amages of almost $200 million a day, and affecting the computers inside the White House are the degree of achievements of this
virus. It subjugated the Windows by acting as a buffer overflow, sending humongous amount of information to the computer so that it
spilt over, eventually forcing a shut down by overlapping the memory of the computers. The problem wasn't solved until Microsoft
issued a revival package to cater for this virus.

SQL Slammer/Saphire

A

nother swiftly spreading virus, it hit 75,000 computers in the first 10 minutes of its inception, taking down and severely damaging
numerous American Banks, Security systems and organizations, and Airline networks. And the virus wasn't just privy to the US; it
ruthlessly damaged the internet capacity of South Korea for at least half a day. The damage was estimated around at least a billion
dollars.

Storm Worm

O

ne of the latest and most recent viruses to strike the internet, the Storm Worm employed a similar strategy to the one used by the
Melissa; the mail's title mentioned a current natural disaster like an earthquake (but most often a storm). Once the email was
opened, the virus spread around like wild fire, affecting registries and documents across the hard disk. It turned out to be a mothervirus, instigating numerous hidden programs in the background which made the PC vulnerable and enticing to hackers.

Klez

W

ith the mix characteristics of a virus, worm and a Trojan horse, Klez gave the antivirus programs a real headache by simply
disabling them and making them look like a joke. However this is only the beginning of its trickery; after it was thought it be
defeated, it was taken over, decoded and customized by black hat hackers (hackers who specialize in unauthorized
penetration) . Its ability was enhanced by providing it with the capability to "spoof" from the user's address book and make it look like that
an email came from them, increasing the chances of the receiver opening the email and becoming the next casualty.

Sasser

D

amaging the computer through network ports, Sasser mostly targeted Windows 2000 and XP. It's main casualties were the news
agency Agence France-Presse (AFP) which had all its satellite communications jammed for hours , U.S. Airlines which had to
reschedule its flights because of the worm had depleted their computers, a Finnish insurance company which was forced to close
down 130 of its offices on emergency basis, Goldman Sachs, and Deutsche Post were all badly affected as well. However its unique feature
was that it did not spread through emails, but rather observed computers and kept a look out for their vulnerabilities. On the basis of its
knowledge, it would scan random IP addresses from the database and send itself to the next victim.

Autorun

T

his virus primarily targeted USBs and flash drives and established them as its major source of movement and propagation. It affected
networks and all the computers present on them. Once affected, the folder options would be disabled, the task manager too would be
unavailable and the virus itself would become the system administrator. The virus would replicate itself in all the folders, therefore
eating up useful space on the hard disk and making it eventually extremely slow. The loss was in terms of useful data on millions of computers
across the world.

e love movies, don't we?
Especially in a fully loaded
theater, with a sky scraping
screen and mega–surround sound that
vibrates every part of our bodies. Well now,
with DVD Player software, you can capture
all of the things you love about the theater
experience and pack them into your
computer.
Even if your computer only has two
speakers, the latest DVD player programs
produce more sound diversity than
ever–enabling you to hear more of the
subtle audio nuances in your movie
soundtracks.
Today's DVD programs also offer intense,
natural color and contrast, empowering
your computer screen to display sharp
detail during shadowy or highly illuminated
scenes. Moreover, with the help of advanced
video display features, these programs can
keep the picture in focus, instead of clouded
or blurred, during rapid scene changes.
Exceptional DVD player software should
offer a variety of features, be easy to use
and install and offer plenty of help support.
The audio and video quality should also be
excellent, allowing for multiple types of
environments and configurations. Below
are the criteria Top Ten Reviews used to
evaluate DVD player software:

VIDEO QUALITY

FEATURE SET
When it comes to DVD player software,
the more features available, the better.
These features include the ability to
accommodate different types of DVDs,
the ability to limit what movies others
can watch using the player and extra
features, like the ability to play video
from your hard drive.

EASE OF USE
Great programs offer a control panel
that is small enough to be unobtrusive,
but clearly visible. The panel should
also allow for easy audio and video
configuration, subtitle operation
and chapter selection.

EASE OF INSTALL
DVD player software should install easily
and work well other programs.
Lower–grade programs often conflict
with software already on a system and
can even cause the system to crash.

The best DVD player programs
provide video images that are crisp,
display natural color and offer controls
to adjust video for optimal viewing in
both darker and lighter environments.

AUDIO QUALITY
DVD player software should offer
support in the form of live chat, email
or online forms, as well as a built–in
help section and a toll–free telephone
support line.

HELP DOCUMENTATION
DVD player software should offer
support in the form of live chat,
email or online forms, as well as a
built–in help section and a toll–free
telephone support line. Whether
you're anchored at home with your
desktop or trekking with your laptop,
with the right DVD player software,
you can fully enjoy high–quality video
playback anytime or anywhere.

hin client computing- a unique
concept that has been around for
decades. Sometimes also called a
lean or slim client is a computer or a
computer program which depends
heavily on some other computer (its
s e r ve r ) t o f u l f i l l i t s t ra d i t i o n a l
computational roles. During the late 70s,
a “dumb terminal,” or a computer without
a hard drive, were being used. They were
similar to a thin client in that all
processing was done from the CPU or
computer they were connected to. A
dumb terminal was simply an output
device or display monitor that had no
computational power to do anything
besides display, send and receive text.
Thin client computing has advanced
drastically in the last decade and can
today rival traditional PCs in
performance. Thin client computing has
advanced to the point where users can't
tell the difference between a thin device
and a “fat” PC. Thin clients occur as
components of a broader computer
infrastructure, where many clients share
their computations with the same server.
As such, thin client infrastructures can be
viewed as the amortization of some
computing service across several userinterfaces. This is desirable in contexts

Thin clients occur as components of
a broader computer infrastructure,
where many clients share their
computations with the same server.
Thin client infrastructures can be
viewed as the amortization of some
computing service across several
user-interfaces.

where individual fat clients have much
more functionality or power than the
infrastructure either requires or uses.
This user experience, coupled with the
extensive cost, security, manageability,
and scalability benefits of thin clients, is
the reason IT personnel in various
industries are exploring – and switching –
to alternative desktop computing.

Since thin clients are cheap, they offer a
low risk of theft in general, and are easy
to replace when they are stolen or
broken. Since they don't have any
complicated boot images, the problem of
boot image control is centralized to the
central servers. On the other hand, to
achieve this simplicity, thin clients are
generally highly integrated systems. This
means that they may lag behind thick
clients in terms of extensibility and
accessibility. For example, if the server
does not have support for independent
audio streams, or the communication
protocols don't transfer such streams,
one simply cannot receive audio from the
server. Similarly, if the client lacks USB
ports, or if there is some communication
failure of its USB signals over the
network, the client might be wholly
unable to support an unexpected USB
peripheral.

RELEASES
PORTABLE HDD
A-DATA Technology, the worldwide leader in DRAM memory and
Flash application products has released a new 2.5” portable
hard drive SH02. Stylishly crafted in 3-dimensional chic imprint
patterns with special surface finishing, SH02 is an in-style
digital accessory for the fashionistas.
As per C.K. Hung, Vice President of A-DATA Technology Product
Planning Group, “We search for any possibility of applying new
technology and combine with the latest design elements and
details to come up with innovative storage products that
differentiate ours from other competitors. SH02 is a perfect

56

MAY - JUNE

example of combining new surface finishing technology with a
designer look, creating a practical yet trendy portable HDD to
the market.”
Using the advanced IMF (In-Mold Foil) technology, SH02
beautifully presents itself with sensory appeals that can be
vividly felt not only visually, but also through the touch of
fingertips. The same surface finishing makes SH02 resist to
scratches, abrasion and annoying fingerprints as well, keeping
the look nice and new all the time as if it is bought for the first
day.

Spyware

Worms

Complete Protection for Small and Medium Business

Virus

Adware
Trojans

Rootkists

4.0
High Performance security for small and midsize corporate and Business network .

Perform your Business at its best

Quick Heal Admin Console takes care of all the
Internet Threats and keep your network safe up
and running .

Complete Protection Across the Network
Quick Heal Admin Console 4.0 is designed to manage and control virus protection across the
network of almost any size with virtually any combination of Windows operating system on
clients. Quick Heal Admin Console 4.0 is designed considering the needs of system
administrator making it easier to deploy and maintain complete protection across the network.

eadership has as its corner stone,
the ability to communicate. When
we use the word communicate, we
are referring not only to the words one
uses to transfer factual information to
others, but also to other "messages" that
are sent and received.
What might these other messages be?
Related to change the leader sends a good
number of messages. These are listed
below.
THE LEADER COMMUNICATES:
A) A sense of confidence and control (or
lack thereof) to employees.
B) His or her own feelings about the
change.
C) The degree to which he/she trusts the
abilities of the employees to get
through the change.
D) A sense of purpose and commitment
(or lack thereof).
E) The degree to which he/she accepts
the reactions and feelings of
employees.
F) Expectations regarding behavior that
is seen as appropriate or
inappropriate (ie. Rumourmongering, back-room meetings).
G) The degree to which he/she is
"connected to" employees situations
and feelings or is "in-touch" with
them.
It is clear that if the leader communicates
effectively, he or she will be sending
messages that decrease resistance,
and encourage moving through the
change more effectively and
positively. The bottom line with all
of this is if you screw up
communicating with employees,

58

MAY - JUNE

even the smallest changes can result in
ugly problems.

WHAT IS COMMUNICATION?
There are all kinds of models of
communication, some basic and some
complex. Our purposes communication
can be described as CREATING
UNDERSTANDING.
Through words, actions, body language,
voice tone, and other processes you send
many messages about yourself, the
changes, and your organization. This
constitutes precisely one-half of the
communication process. The
second half consists of
verifying that the message
you intended to send was
actually received and
interpreted the way you
intended.

The only way that you can be sure you
have created understanding is to listen to
the people you are communicating with,
and make special effort to encourage
them to reflect back to you what they
have heard (and what they make of it).
REMEMBER:
A) Although you communicate in a way
that seems clear to you, the receiver of
the communication, filters the
information through a very complicated
set of pre- conceptions, that can function
to distort the message received.
B) Receivers listen selectively. They hear
and process some things and gate out
other things. That means that while you
may have explained the "whole picture",
is it likely that the whole thing wasn't
received.
C) The only way you can ensure that you
have created common understanding is
by asking the other people what they
have heard, and what their reactions are
to it.
IMPORTANT MESSAGES REGARDING
CHANGES
Since we have indicated that
communication involves sending a variety
of important messages, it is important
that when you communicate about
change you know what kind of messages
you wish to send, and the what you want
people to
take away from your
communication.
W h e n e ve r yo u c o m m u n i c a t e t o
employees about change, you
should be striving to convey the
following position.
A) That you are personally
committed to the change,
and seeing it through,

Through words, actions, body language, voice tone, and other
processes you send many messages about yourself, the
changes, and your organization. This constitutes precisely
one-half of the communication process. The second half
consists of verifying that the message you intended to send
was actually received and interpreted the way you intended.
even if it has negative consequences.
B) That you recognize that the change
negatively impacts upon some people.
C) That you are open to discussion of the
feelings of employees regarding the
change.
D) That you are confident that the "team"
can make it through the changes.
E) That you want and need input to make
the changes work.
Sometimes you won't be committed to
the change, or you won't be very
confident that you and your staff can pull
it off, particularly when the change is
imposed from above. While some may
disagree, it is important that you still
convey an image of strength and
commitment despite your own
misgivings. The change leader has a role
to play, and if you have mis-givings or
strong negative emotional reactions of
your own it may be more effective if you
underplay them. If you show anger about
a change, you may legitimize the same
kind of negative behaviour in your staff.
While you shouldn't hide your own
negative reactions completely, it is
probably wise to keep them in the
background by stating them in a matter
of fact way and moving on.
COMMUNICATION AND CHANGE WHO, WHAT, WHEN, HOW?
As a change leader you need to
make decisions about who you
must communicate with, what
needs to be communicated,
when you will communicate
and how you will do it. We
will take a look at each of
these in turn.
WHO?
Managers sometimes have a

tendency to communicate about change
on a "need to know basis". However,
effective change leaders recognize that
almost any change will have effects on
most people in an organization, no matter
how removed they are from the change.
The basic rule of thumb is that
communication should take place directly
between the manager and employees
when employees need to know or want to
know.
Except for situations that involve
confidentiality, even those who are
indirectly affected will likely want to know
what is going on, and how it may affect
them. This applies to your own staff, and
those organizations that are related to
you (ie. other branches within a division
or department, client organizations, etc).
You are better off over-including people in
your communication, than leaving people
out.
WHAT?
If you need to determine what to
communicate, keep in mind what you are
trying to accomplish through your
communication about change. When you
communicate you are trying to:
A) Give information that will reduce
uncertainty and ambiguity regarding the
change.
B) Pre-empt the hidden information
system of the grapevine, so you can
ensure that incorrect anxiety provoking
information is not spreading.
C) Provide forums for employees to
communicate their reactions and
concerns to you.
If you would like another rule of thumb,
when deciding what should be
communicated, communicate as much
information about the change as is

MAY - JUNE

59

Communicating in groups
also has some disadvantages.
In many organizations there
will be people who will not
feel comfortable talking in
a group context. The more
"personal" the effects of
the change, the more likely
people will withdraw from
the group process.
information at the same time. Group
communication also allows people to
interact with each other about the
changes and can help people develop a
sense of team, particularly in a climate of
adversity.
Communicating in groups also has some
disadvantages. In many organizations
there will be people who will not feel
comfortable talking in a group context.
The more "personal" the effects of the
change, the more likely people will
withdraw from the group process.
A second danger of group communication
is that one or two particularly vocal and
negative people can set the tone for the
group, and foster unproductive negative
discussion. While expression of concerns
about change are healthy, the "doomsayer" can cause this process to become
destructive. For this reason, group
communication needs to be managed
with skill and expertise. Sometimes an
external facilitator is necessary.
Finally, there are some issues that cannot
be discussed within a group. For
example, in downsizing situations, it is
inappropriate to announce to a group that
John and Mary are losing their jobs. When
changes are likely to create a high degree
of upset to individuals, they must be dealt
with in private.
Communicating on a one-to-one basis
has the advantage of privacy. When bad
news is communicated, the person
receiving the news is less pressured to
withhold their reactions. One-to-one
communication also allows more in-depth
exploration
of the person's feelings,
ideas and reactions to the change.
A disadvantage to using one-to-one
communication is that it may fragment
your team. There is also a possibility that
you will send slightly different messages
to different staff members.

60

MAY - JUNE

PRESCRIPTION:
Most situations require both group
communication and one-to-one
communication. They compliment each
other. Using only one or the other will
create problems.
Below are some guidelines.
USE GROUP COMMUNICATIONS IF:
A) You need to ensure everybody hears
the news at the same time.
B) You want to encourage group
discussion to generate ideas and the
problem solving process.
C) You want to increase the sense of
team.
D)You wish to set the stage for individual
meetings. For example, in a lay-off
situation, you can call a short group
meeting to announce the lay-offs
generally, then immediately meet
individually with each staff member to
inform them of their status.
USE INDIVIDUAL MEETINGS IF:
A)The changes are likely to cause a high
degree of emotionalism that is better
dealt with in private.
B)You want to ensure that shyer people
have a chance to express themselves.
C)The changes involve elements that
should remain confidential (pay or
classification changes, employment
status, etc).
D)You need to have detailed discussion
about the change with specific people.
ISSUE #2: WRITTEN OR ORAL
There is a tendency for people to avoid
unpleasant interactions, and sometimes
managers will use written communication
to avoid the discomfort of dealing face to
f a c e w i t h s t a f f. W h i l e w r i t t e n
communication can play an important
role in communicating about change, it
should not be used for this reason alone.
Below are some guidelines regarding the
use of written versus oral communication.
ORAL COMMUNICATION IS MORE
APPROPRIATE WHEN:

A) Receiver is not very interested in
getting the message. Oral communication
provides more opportunities for getting
and keeping interest and attention.
B)Emotions are high. Oral communication
provides chances for both you and the
other person to let off steam, cool down,
and create a climate for understanding.
C)You need feedback. It's easier to get
feedback by observing body language and
asking questions.
D)The other person is too busy or
preoccupied to read. Oral communication
provides better opportunities to gain
attention.
E)You need to convince or persuade. Oral
communication provides more flexibility,
opportunity for emphasis, chances to
listen to and remove resistance, and is
more likely to affect people's attitudes.
F)The details and issues are complicated,
and cannot be well expressed on paper.
WRITTEN COMMUNICATION IS
APPROPRIATE
IF:
A ) Yo u r e q u i r e a r e c o r d o f t h e
communication for future reference.
B)Your staff will be referring to details of
the change later.
C)You are communicating something with
multiple parts or steps and where it is
important that employees understand
them.
Generally, it is wise to use both written
and oral communication. The more
emotional the issues, the more important
it is to stress oral communication first.
Written communication can be used as
backup.
CONCLUDING COMMENTS ON
CHANGE
LEADERSHIP
As a change leader, communication is
your primary and most important tool. We
have attempted to outline some of the
important parts of the communication
process, but short of writing an entire
book on the subject, it is difficult to
discuss
all the subtleties and issues
about human communication.
There is no substitute for good
judgement, and change leaders need to
be reflective and thoughtful about the
ways they communicate. There is also no
substitute for LISTENING, and receiving
feedback from your staff and colleagues
about how you communicate. You may
make communication mistakes, but the
mark of an effective change leader is that
these mistakes are quickly identified
through feedback and discussion, and
corrective action is taken.

POWERCOM
GLOBAL LEADER IN POWER PROTECTION
how many computers can be attached?

how much back up time?

what power battery to attach?
how much space is required?
how many racks for the battery?

Confused about providing your
customers the right UPS solution?
take out the hassle

icrosoft Office 2010 comes with
variant features. There are a
number of updations in that
from which one is the ability to upload
your files to Office Web Apps. When you
do so, an Upload Center icon appears in
the Taskbar and helps manage
documents. Here's a guide to stop it
from showing up.
If you're running Office 2010 and upload
files to the web, you'll notice the
Microsoft Office Upload Center Icon
appears on the Taskbar in the
Notification Area. It will stay there even
after you're done uploading the
document and closed out of all Office
apps.
Getting rid of it is not difficult. Rightclick the icon and select Settings. When
the Microsoft Office Upload Center
Settings window appears, under Display
Options, uncheck Display icon in
notification area and click OK. Now it will
no longer appear in the Taskbar.
After you upload your first document, it
will also want to startup with Windows.

You can go into msconfig and disable it
from automatically starting up. If you
need to access it again, it's part of Office
2010 Tools which you can access from
the Start Menu. Or you can type upload
center into the Search box in the Start
Menu and hit Enter.
If you upload a lot of work to Microsoft
Web Apps you might find this tool
useful, but if you only
occasionally upload

ith the existence
of laptops, since
more than a decade ago, other
than the obvious advantage of size and
weight over a regular PC, they also served
another important purpose - freedom
from wires. A fully charged laptop runs for
two hours at least. Netbooks, due to the
use of low-power consuming internals,
stretch that uptime to more than four
hours on an average. There are times
when we are caught up somewhere
without a wall socket nearby. So, what do
we do in such situations to get the
maximum juice off your battery? Read on.
TURN OFF WI-FI AND BLUETOOTH
WHEN NOT IN USE
Leaving Wi-Fi and Bluetooth (the two
wireless modules, especially Wi-Fi) on
even when not in use can eat up your
battery life pretty fast, as they keep
searching for new networks and devices
to connect. If you're not going to use
internet over Wi-Fi, it's ideal to simply
turn it off.
By having a conservative approach

towards screen brightness,
one can shoot those battery
life figures upwards. For the
uninitiated, brightness controls
are typically on the Function (F1F10) keys. Lower it down to a level where
you can view the screen comfortably
without any hindrance. Not only will it
save battery life but also protect your
eyes from the otherwise bright rays from
the screen.
SELECT A SUITABLE POWER SCHEME
IN YOUR OPERATING SYSTEM
Today's laptops by default have automatic
power management when you unplug
your charger. Some manufacturers, like
Asus and Lenovo, even make their own
set of software to optimize power. But it's
always better to know how to choose the
appropriate power scheme in your OS.
In Windows Vista/7, right-click the
battery icon and click "Power options".
Generally there are two to three states;
"High Performance", "Balanced" and
"Power saver". When you're using your
laptop on battery, and are not going to be
multi-tasking a lot, keep it on "Power
saver" since it will give the most mileage,
but slightly reduced performance. Only if
you feel that the laptop is behaving too

sluggishly, change it back to "Balanced".
Click "Change plan settings -> Change
advanced power settings" in order to
manually tweak power optimization for
every component in your laptop. Always
select Screensaver, followed by the
"Power options" button below and select
"Max battery" to boost battery life.
IMPROVE YOUR POWER-SAVING
ETIQUETTES
When you're walking away from the
laptop, close the lid, so that the laptop
goes to "Sleep" mode (in Vista/7) or
"Stand-by" (in XP). This is a state in which
the laptop consumes the least amount of
battery, and comes back to life in a few
seconds when you turn it on again.
Disconnect any peripheral storage
devices like portable hard disks, pendrives or wireless modems after use,
since they will draw power from the laptop
battery in order to function. Make use of
earphones or headphones instead of
playing music off the loudspeakers, since
the former should consume a little less
power. Don't keep CDs in the drive when
not in use, to avoid occasional spins when
you open Windows Explorer.
REPLACE THE BATTERY
Laptop batteries, like cell-phone
batteries, lose their capacity to hold
power as years pass by. That's why you
may see that your new laptop back then
used to give you two to three hours of life,
but after a few years struggles to run for
even one hour. But that doesn't
necessarily mean its time to change your
laptop. You can simply get a replacement
battery to get it back to the way it used to
be.

ur PCs are usually quick to let us know when something
is wrong. It's just not always easy to understand what
they are trying to tell us so we can fix the problem. This
guide shows you how to interpret a few common cries for help
and diagnose the underlying causes.
Problem 1:
My computer spontaneously shuts down or restarts
The cause:
When your computer shuts down or restarts for no apparent
reason, it's not possessed, it's just trying to tell you that there
may be something wrong with your hardware. In most cases, it's
either your power supply or your fan that's at fault.
The fix: Check to see if your computer is producing more heat
than normal. When a fan is dirty or malfunctioning and can't cool
the PC properly, the computer will shut itself down. Try cleaning
your fan. If your fan is clean and seems to be running smoothly,
then your power supply unit (PSU) may be broken and needs to
be replaced.
Problem 2:
I am getting the message “you system is running low on
virtual memory”
The cause:
In addition to RAM, virtual memory is used by your PC to run
applications. The longer a program has been open without being
shut down, the higher the virtual memory usage will be. So if you
get this error occasionally, this could be the cause and restarting
certain programs or rebooting may help. Otherwise you may

have an application with a memory leak.
The fix:
If you suspect a memory leak, hit Ctrl-Alt-Delete to get to your
Task Manager. Click on the Processes tab, then View -> Select
Columns. Tick the box for Virtual Memory Size. In Vista, select
Commit Memory. Now you will have a new column showing the
virtual memory sizes of all the applications you're running. To
sort the list from largest to smallest, click twice on the column
name. If you find an application that is using a suspiciously high
level of virtual memory, it could have a bug and should be
reinstalled. If an application doesn't seem to be at fault, but you
still get this message repeatedly, your system's RAM may be too
low, and you might need to install more RAM memory.
Problem 3:
I keep getting DLL errors
The cause:
Files that perform common tasks and are shared among different
Windows applications have the suffix .dll, which stands for
Dynamic Link Library. So when one of these files is “missing” or
“not found”, it may have been deleted during the uninstall of
another program or been corrupted.
The fix: If the error messages occur only when you're running a
specific application, you should reinstall that application as it
might not have been installed properly. Other DLL files can be
searched for and downloaded from the Internet. Just make sure
you are getting it from a reliable source. Also be sure to clean
your PC and protect it from viruses and spyware as they can also
corrupt your DLL files.

“Take up one idea. Make that one idea your life - think of it, dream of it,
live on that idea. Let the brain, muscles, nerves, every part of your body,
be full of that idea, and just leave every other idea alone. This is the way
to success, that is way great spiritual giants are produced.”
Swami Vivekananda

he leading value added
distribution house Aditya
Infotech Ltd., which enjoys
the reputation of working with
world renowned IT brands and is
known for its exemplary
distribution network. It has now
geared up to promote and sell the
'' ground breaking product of
gaming world: ' Nvidia GeForec
3D vision glasses' across the
country. Aditya Infotech has
always been working with the
latest cutting edge technology
products and it is no surprise that
they are one of the very few
companies who are engaged in
the 3D market, which has
recently been stirred by the entry
of Samsung 3D LED Tvs. In order
to revamp the 3 market and
usher a new era in the world of
TV/PC entertainment, Nvdia has
launched a product called Nvidia
3D glasses which gives an
immersive 3D viewing experience
to the viewers. Aditya Infotech
Ltd has taken the responsibility to
promote the 3D vision across
India, in both channel, as well as
retail market. To tap the market,
Aditya Infotech is offering an
exclusive 'Bundle Kit' to its
customers/partners which consist
of a Samsung Syncmaster
2233RZ 22" 3D Gaming LCD

What are Nvidia 3D
Vision Glasses ?
The heart and soul of the
bundle is a high-tech
active shutter glasses,
designed with top-of-theline optics, which delivers
double the resolution per
eye and provides ultrawide viewing angles than
passive glasses. These
glasses are immensely
attractive and sporty in
look and do not looks

geeky at all. The GeForce
3D Vision glasses hold
approximately 40-hours
of gaming per full charge
and once the glasses have
less than two hours of
battery life left the light
will start to flash red.
When the light goes out
you need to hook it up to
the USB cable to charge
the glasses.
Promotion Plans by
Aditya Infotech Ltd.
Aditya Infotech has rolled
up its sleeves to promote
Nvidia 3D vision in all Tier

and Tier 2 cities. Aditya
Infotech was the co
sponsor of a mega
gaming event called 'God
of Gaming', which was
recently held in Delhi
during the month of May.
Aditya Infotech had made
an attractive 3D
experience zone to
provide a touch & feel
experience to the end
customers. The event
attracted over a thousand
gamers and end
customers and was
spread across 3 days. It
was for the first time in
Delhi that such a 3D
gaming experience was
given to
customers/gamers on
such a large scale. Along
with the mayhem of
gaming, the leading
distribution house also
arranged an informative
session for the end
customers to educate
them about the nuances
of 3D technology and its
dazzling effects. At the
end, Aditya Infotech
distributed 3D Vision
glasses and Nvidia
GeForce graphic cards to
the winners of the event.
The event happened in
the posh 'Ambiance Mall'
at Gurgaon and was
organized by Delhi Times.

3D vision set up by
Aditya Infotech Ltd.
Aditya infotech is planning
to organize a series of
road shows in several
cities to provide the
ultimate 3D experience to
end customers as well as
channel partners. The
leading distribution house
also plans to arrange
channel training
seminars, in order to
educate its partners about
the 3D vision technology,
its USP and usage. â&#x20AC;&#x153;3D
technology is the future of
TV & PC entertainment
industry. This technology
is already creating waves
in the international
market and has a huge
potential. In coming
time, a gamut of 3D
movies, 3D games and 3D
media would be launched
and hence there is no
possibility of this
technology being dying
out. â&#x20AC;? quoted Mr. Sanjay
Gogia, the Country head
at Aditya Infotech Ltd.

h no you have been blue-jacked
by some and now you are
petrified thinking you have been
hijacked or hacked and have no idea what
to do??? Calm down, and calm your
nerves down. Blue jacking has nothing to
do with either hacking or hijacking it is
merely a light hearted joke played on
people via Bluetooth. This prank is usually
transferred via Bluetooth to any
Bluetooth-enabled device such as mobile
phones, PDAs, Laptops sending a vCard
which typically contains a message in the
name field (i.e., for bluedating or
bluechat) to another bluetooth enabled
device via the OBEX protocol.. Breaking
the terminology it basically has been
derived as following, Blue from Bluetooth
and jacking from hijacking. Rest assured
that while performing this joke there is no
access made to personal information or
private data.
It basically involves in sending an
unsolicited message to individuals who
either have their Bluetooth switched on or
have forgotten to switch it off. Since there

is a possibility that people are able to send
viruses and other malicious software's to
cell phones and laptops. This has been
introduced merely to give a jump of heart
to the receiver. One is left to wonder in
fear that he is done for the day, only to be
surprised that his friends have played a
dirty and filthy prank on him. It consists of
simply sending a contact which opens up
to a message via the OBEX protocol. A
number of people have their own
interpretation of this malicious joke and
some simply have a laugh on its use. It
should be acknowledged that in such a
use of prank both parties are in complete
control of their devices and the bluejacker
is unable to steal anything from your
phone or laptop.
Since few people are aware of it, once
they receive a message they instantly
assume their phone is malfunctioning. In
most modern phones there is a possibility
of sending an image or a sound and later
are enticed by the startled and fear filled
faces, that's when the fun starts.
Process for conducting a Blue-jacking

prank: Click on contacts, Create a new
contact, Include your surprising and
startling message in the Name field, Save
the contact, Make sure your Bluetooth is
switched on, The phone will display
possible victims whose Bluetooth is
switched on, & Select the contact and the
person you want to send via Bluetooth
and they have been instantly Blujacked.
Once the individual foolishly opens the
contact, and reads the displayed message
he is under attack.
But keep in mind that it should be
practiced in tolerable boundaries. Too
much of anything will prove to be harmful
and may end up in harassing them. Also
keep in mind the places you want to
conduct this prank. Don't do it in an
airport, or in a hospital. It's best if this
played in the boundaries of school or
work, amongst people you know and pose
no threat. Or else you wouldn't want to
find out that the person you Blujacked
was actually your boss and he fired you
the next day. Now that wouldn't be such a
funny prank.

LaCie Network Space MAX
Easy and Secure Network Storage for the Home
LaCie released a dual-disk Gigabit network storage and media server – the LaCie Network
Space MAX, design by Neil Poulton. Now, users can easily store and share their
most important files throughout the home with complete data security.
The Network Space MAX includes two large-capacity hard drives that can be
configured for maximum security (RAID 1) or maximum capacity (RAID 0). If
protecting your data is a priority, the RAID 1 mode will ensure automatic disk
mirroring – meaning all files will be copied onto each of the disks. If one drive
fails, data will not be lost.
The Network Space MAX is designed for ultimate usability. LaCie Network
Assistant software helps you set up the product within a few minutes. It provides the
best user experience for quick detection and access to the Network Space MAX.
This is user-friendly dashboard allows you to easily manage files, backups,
private accounts, and download torrents.

92

MAY - JUNE

Additionally, with the Network Space MAX, the files stored on the hard drive are
fully accessible outside your home from any connected computer using the remote
access service."Even for networking beginners, LaCie Network hard drives offer a
simple way to share one’s media between multiple computers in the home,” said
Patrick Salin, LaCie Digital Home Business Unit Manager. “The RAID 1 capability
of LaCie’s Network Space MAX means users can be assured their valuable data is
always safe and accessible.”
The Network Space MAX features a media server, making it easy to stream files
to any connected computer or any UPnPTM/DLNA® compliant device (such as a
PlayStation®3 or Xbox®). Computers with iTunes® installed can also stream the
music stored on the Network Space MAX. The storage starts in 2TB capacity.

History of@Sign
W

e knew the day would come when we would see computers in the classrooms of students of all ages, even preschoolers. Even
at home, computer usage among younger children is on the rise, and as such, so is Internet usage by a younger audience.
Recent CPB statistics show that more than 65 percent of children in the United States use the Internet at home, school or at
public libraries.
Naturally, many parents are torn between allowing their children access to registration-required Web sites, whether they are sites
created by individuals or Web sites created by corporations and nonprofit organizations.
Seeing a need for some concrete laws regarding what can and can't be used when collecting information from children online, the
Federal Trade Commission enacted new rules for Web site administrators to ensure a child's privacy is respected online. These rules were
an addition to the 1998 Children's Online Privacy Protection Act (COPPA), and took effect in the year 2000.
Web sites knowingly collecting information from children under the age of 13 must provide a public notice on their Web site that
indicates the type of public information they collect (such as name, phone number address and so on). The site must also state how this
information is used, and whether the information is made available to third parties. Additionally, unless the information is being used for
a one-time event (like a contest or to collect an e-mail address for a newsletter list), the Web site must obtain parental consent before
collecting and using this information about a child.
¡
Afrikaans - In South Africa, it is called
aapstert, meaning "monkey's tail"
¡
Arabic - The @ symbol does not appear
on Arabic keyboards, only keyboards in
both Arabic and English. The Arabic
word for @ is fi, the Arabic translation of
at
¡
Bosnian, Croatian and Serbian - In
these countries, it is referred to as the
"Crazy I"
¡
Cantonese - In Hong Kong it is
generally referred to as "the at sign,"
just as in England and America
¡
Catalan - In Catalonia, it is called
arrova, a unit of weight
¡
Czech - In the Czech Republic, it is
called zavinac, meaning "rollmop," or
"pickled herring"
¡
Danish - It is called alfa-tegn, meaning
"alpha-sign" or snabel-a, meaning
"elephant's trunk" or grisehale,
meaning "pig's tail"
¡
Dutch - Since English is prominent in
the Netherlands, the English "at" is
commonly used. However, the Dutch
also call it apestaart, meaning
monkey's tail," apestaartje, meaning
"little monkey's tail" or slingeraap,
meaning "swinging monkey"

¡
French - In France, it is called arobase
the name of the symbol. It is also
referred to as un a commercial,
meaning "business a", a enroule,
meaning "coiled a", and sometimes
escargot, meaning "snail" or petit
escargot, meaning "little snail"
¡
German - In Germany, it is called
Affenschwanz, meaning "monkey's tail"
or Klammeraffe, meaning "hanging
monkey"
¡
Greek - In Greece, it is called papaki,
meaning "little duck"
¡
Hebrew - It is shablul or shablool,
meaning "snail" or a shtrudl, meaning
"strudel"
¡
Hungarian - In Hungary, it is called a
kukac, meaning "worm" or "maggot"
¡
Italian - In Italy it is called chiocciola,
meaning "snail" and a commerciale,
meaning "business a"
¡
Japanese - In Japan, it is called atto
maaku, meaning "at mark"
¡
Mandarin Chinese - In Taiwan it is called
xiao lao-shu, meaning "little mouse,"
lao shu-hao, meaning "mouse sign," athao, meaning "at sign" or lao shu-hao,
meaning "mouse sign"
¡
Norwegian - In Norway, it is called

either grisehale, meaning "pig's tail" or
kro/llalfa, meaning "curly alpha." In
academia, the English term "at" is
widely used
¡
Polish - In Poland, it is called malpa,
meaning "monkey." It is also called
kotek, meaning "little cat" and ucho
s'wini, meaning "pig's ear"
¡
Portuguese - In Portugal it is called
arroba, a unit of weight
¡
Romanian - In Romania, it is called la, a
direct translation of English "at"
¡
Russian - Russians officially call it a
kommercheskoe, meaning
"commercial a", but it is usually called
sobachka, meaning "little dog"
¡
Spanish -- Like in Portugal, in Spain it is
called arroba, a unit of weight
¡
Swedish - The official term in Sweden is
snabel-a, meaning "trunk-a," or "a with
an elephant's trunk"
Thai - There is no official word for it in
Thai, but it is often called ai tua yiukyiu,
meaning "the wiggling worm-like
character"
¡
Turkish - In Turkey, most e-mailers call
it kulak, meaning "ear”

MAY - JUNE

9
3

Firefox
ADD-ONS TO

SECURE LAPTOP
When you're out with your laptop,
you probably like to visit frequent spots
where you know you can score easy access
to the Internet via a hotspot. When you're
outside your own home network, though,
which you've probably secured with a
password against strangers, you're often
at your most vulnerable. You never know
who you're sharing a network with.

94

MAY - JUNE

By Paul Rubens

F

ifteen years ago the floppy disk was the most
common vector used by malware writers to spread
viruses, and in more recent years e-mail has been
the primary vector. But the trend now seems towards
spreading malware and exploiting vulnerabilities using
malicious code on Web sites which exploit browser
vulnerabilities.
To minimize the risk of succumbing to a Web-borne attack
then, it's essential that you use the Web as safely as
possible, and the first thing to decide upon is a browser. The
two most popular choices are Microsoft's Internet Explorer
and Mozilla Firefox, and there's some debate about which
one is more secure. It's certainly true that Explorer is used
by far more people than Firefox (due to it's being part of the
Windows operating system) so one could argue that, all
things being equal, choosing the minority browser is the
sensible choice because it offers a smaller (and thus less
tempting) pool of potential victims to malware writers.
Ensuring that the browser is up to date can help minimize
security risks, but perhaps the most interesting feature of
Firefox from a security perspective is the possibility of
enhancing the browser's security with the addition of
browser extensions or add-ons. Of course any add-ons
risks adding new vulnerabilities, but if they protect against
known problems at the expense of possibly adding as-yet
unknown ones, then the trade-off may well be worth it.
With that proviso, here are some important ones to
consider for anyone browsing the Web outside a trusted
network, to protect against Web-based exploits, and more
general security risks. All are available from
http://addons.mozilla.org.

NoScript
This Firefox extension allows the user
to enable or disable Java, JavaScript,
Flash, Silverlight and other plug-ins
(which could be malicious) for all sites
unless the sites are specifically
marked as trusted, directly from the
status bar. These can also be
temporarily allowed on any given site
without adding it to a whitelist.
NoScript also protects against Cross
Site Scripting attacks, and
ClickJacking (also known as UI
Redressing) attacks that cause users
to click on buttons which are obscured
by other page elements.
CS Lite
This simple add-on allows users to
selectively or globally block cookies
from websites, and view edit and
delete them directly from the status
bar. It does for cookies what NoScript
does for scripts and plug-ins.

Firefox has the ability to remember
and enter passwords for sites you
may visit, and these passwords
can be protected with a master
password. If the master password is
long and not guessable but stored
in your head (i.e. not written down)
then having Firefox remember
passwords can be a very
secure solution.

ShowIP
ShowIP helps against phishing attacks
by displaying the IP address of the
current website in the status bar at the
bottom of the browser. While this is of
limited use in itself (unless the user
happens to know the IP address of the
web site they want to visit,) right
clicking on the IP address shown in the
status bar brings up a number of
options, including running a whois
lookup to confirm the registered
owner of the IP address concerned.
WOT (Web of Trust)
The WOT add-on gives a
trustworthiness rating for sites that
users visit based on feedback from
other WOT users, access from a WOT
button in the address toolbar. The
button itself changes color depending
on the trustworthiness of the site,
giving an instant warning when a user
visits a site that may be a source of
malware. For some sites, such as
those rated dangerous, WOT brings up
a warning screen with the options to
proceed to the site, add it to a white
list, or to find out more information
about the nature of the dangers that
other users have reported.
Foxmarks
There's always a danger with laptop
computing that bookmarks for sites on
your desktop computer won't be
available on your laptop. If you then

type in the address of the site
manually there's the possibility that
you could misspell it, and end up on a
malicious Web site inadvertently.
Foxmarks prevents this by syncing
your laptop and desktop bookmarks,
so you can access frequently visited
sites via bookmarks which are known
to work. Foxmarks can also sync Web
site passwords (protected by a PIN) so
that passwords stored on a desktop
machine by Firefox's password
manager are also available without
having to write them down for use on
the road. This also makes it more
practical to change passwords
frequently and store them within
Firefox without having to worry about
keeping the password stores on
different computers synchronized.
Master Password Timeout
Firefox has the ability to remember
and enter passwords for sites you may
visit, and these passwords can be
protected with a master password. If
the master password is long and not
guessable but stored in your head (i.e.
not written down) then having Firefox
remember passwords can be a very
secure solution. The problem is that
once the master password is entered
Firefox gives you access to passwords
without prompting for the master
password until it detects five minutes
of inactivity. This is a potential security
risk if you leave the laptop unattended
for a minute or two in a public place. To
prevent this, Master Password
Timeout allows you to specify your
own, shorter timeout period. The
master password can also be "logged
off" manually from the Tools menu
once Master Password Timeout is
installed.
FireGPG
The use of encryption and digital
signatures are important ways of
maintaining the security of
communications which are sent over
insecure channels such as the Internet
, when a VPN is not available. FireGPG
allows users to encrypt, decrypt, sign
and verify the signature of text from
within Firefox from a FireGPG item in
the Tools menu. It also adds buttons to
the Gmail web page carrying out the
same functions. Note: FireGPG
requires that GnuPrivacyGuard (GPG)
is installed on the laptop computer.

1. Get organized
Where are last month's progress reports? If you're disorganized, it's
highly likely that you'll spend too much time searching for things you
need. So the heart of any good productivity plan is good personal
organization. Set aside a day or even a weekend to
go through your PC and Laptop and organize files
and folders, get rid of information or programs you
no longer need, and clean up your workspace. Not
only is it mentally refreshing, you'll be amazed at
how much time and frustration you'll save when you
know exactly where to find that elusive progress
report.

6 SOURCES
In this competitive economy, just being able to
do your jobs is no longer enough. Now more
than ever, companies are pushing their
employees to work harder, better and “smarter”.
In effect, many employees are drowning in
work, are overwhelmed, less productive and
don't know which task to handle first. If this
scenario sounds familiar to you, then it's time
for our top tips and some easy-to-implement
ideas you might find useful.

2. Identify and eliminate distractions
While ringing telephones and chatty colleagues are a
regular part of office life, learn to identify when
they're getting in the way of your work. While some people can function
perfectly well with noise and activity all around them, others find that
even the gentle hum of a fan wrecks their concentration. If you're the
latter kind of person, don't be shy about getting the peace you need to
do your work properly. Retreat with your laptop to a quiet conference
room, try noise-cancelling headphones, or work from home if it's
feasible and less distracting.

3. Get plenty of rest
When your to-do list is three pages long, taking a break may sound
counter-intuitive. However, you can't work efficiently if your brain and
body are exhausted – and working to exhaustion can create serious
long-term health problems. So make sure you get sufficient sleep every
night, and take short breaks during the work day. Even a ten-minute
walk can revive you, reduce stress levels and improve your
concentration.
4. Priorities and delegate
Without some idea of which tasks are most important and require the
most effort, you may lurch from project to project and waste time that
could be better spent focusing elsewhere. So as part of your “getting
organized” process, make a list of all the tasks you have to complete on
a daily basis and rank them in order of importance. Then, decide how
much time realistically needs to be spent on each one, and try to stick to
that schedule each day. You may also want to evaluate which, if any, of
those tasks could be done by someone else. Maybe an employee or
colleague has more time or is better suited to the task. Effective
delegation isn't necessarily about dumping work on someone else – it's
just about efficiency.
5. Talk less, do more
Do you spend a lot of your working time in meetings? Meetings are often
unproductive and consume essential hours of the day that could be used
to do actual work. If this is the case, simply stop holding those meetings
or postpone them to a day when you do not have so many deadlines
looming on the horizon.
6. Reading isn't action
You're currently reading an article about how to be more productive at
work. Well, reading about it also keeps you away from tackling your
tasks.

NETWORKING MARKET DYNAMICS
Featuring fun and powerful Applications, the latest Basic, Surf, Share and Play Max range of Wi-Fi devices enable
you to play- music games, HD videos as well as share photos and print wirelessly from anywhere in you home.

V

irtually rewriting the Wi-Fi
networking market dynamics,
Belkin has launched a brand new
range of next generation Wi-Fi
equipment that seek to embrace new
consumers into fold by making home
networking simple and enjoyable.
Belkin's state of art NetNext Wi-Fi
product lineup includes Basic, Surf,
Share and Play Max routers, Modem
routers and wireless USB client adapters
that let consumers play music, games,
HD videos, share photos and print
wirelessly from anywhere at home. The
new Wi-Fi range is designed for all
consumers, right from the “Technology
Enthusiast” to a “Newbie” who may be
confused by the "speeds and feeds"
marketing approach used by vendors to
market most of today's consumer Wi-Fi
equipment. Pre-loaded with exciting
applications (“Apps”), Belkin Net Next
range offers an exciting value
proposition to "Apps" savvy consumers
keen on “Doing More”, with what is
essentially a plug and play device in

addition to being simple and easy to set
up wirelessly, stylishly designed and
with great aesthetics. In addition, to
make the experience of users seamless
and hassle free all models have a built
in "Self-Healing" feature which
automatically detects and resolves
network problems. Key applications on
the Belkin NetNext Router Range areSelf Healing: Automatically detects and
resolves network problems and runs
routine maintenance scans to give the
clearest wireless channel. Available on
Basic, Surf, Share and Play Max.
Memory Safe: Automatically backs up
precious photos and important files to
an external hard drive. Available on
Share and Play Max.
Print Genie: Print wirelessly from any
computer on the network from
anywhere in the home. Available on
Share and Play Max.
Music Mover: Play MP3s from a music
library on the home stereo wirelessly.
Connect an external hard drive on which
to store music to the router—and move

music from a computer to the stereo
through devices like Xbox 360 and
PlayStation 3. Available on Play Max.
Music Labeler: Automatically identifies
and labels tracks with the correct title,
artist, and genre. Available on Play Max.
Daily DJ: Get daily personalized
playlists from a music library based on
your mood. Available on Play Max.
Torrent Genie: Downloads large media
files like movies, music, and games,
even when the computer isn't on.
Available on Play Max.
Bit Boost™: Prioritizes traffic on the
network for video, gaming, and VoIP,
allowing easy selection of the most
important data streams for seamless
network traffic. Available on Play Max.
In addition to “Apps”, key USPs of the
product line include
Easy Start – Wireless Set-up & Prewired Pre-set security – Immediate
network security out of the box
Video Max – Optimizes the network
settings for best streaming video
performance.

& 'BIO-unlocKING'
BIOSTAR, a professional manufacturer of motherboards has revealed its new
“TA890FXE” motherboard with “BIO-unlocKING” utility that makes it possible
to turn a budget quad-core version of a CPU into full six-cores for significant
computing gains. AMD new Phenom II X6 processor with 890FX chipset
combination, a high-powered computing platform designed to meet the
demand of today's gaming enthusiasts. The AMD Phenom II X6 processor can
switch between utilizing two or three cores for functions such as running
productivity software to six cores for content creation and immersive 3D
applications.
“TA890FXE” motherboard is powered by a 6 phase PWM, supporting 140W
processors, four PCI-Express 2.0 x16 slots supporting ATI CrossFireX
technology, apart from two legacy PCI slots. 7.1 channel HD Blu-Ray audio,
Gigabit Ethernet, and FireWire make for the rest of it

100

MAY - JUNE

ONE SHOP,UNLIMITED OPTIONS
WITH BEST PRICE,
BEST QUALITY,WIDE RANGE & FAST DELIVERY
originals

Connexxion Media Magazine May-June 2010

‘Connexxion Media’ is equipped with some very valuable content & Data useful to every IT Individual working across India. In every edition of Connexxion Media Magazine we make sure that people don’t use our magazine as a daily newspaper, we want people to use our magazine at fullest, and a concept of Directory and a Newsletter has worked wonders for the IT Industry.